SUPA
☆28Jan 15, 2026Updated last month
Alternatives and similar repositories for SUPA
Users that are interested in SUPA are comparing it to the libraries listed below
Sorting:
- ☆22Nov 12, 2020Updated 5 years ago
- ☆17Sep 20, 2019Updated 6 years ago
- Piecewise debloating toolchain☆15Dec 21, 2019Updated 6 years ago
- LLVM Implementation of different ShadowStack schemes for x86_64☆39May 2, 2020Updated 5 years ago
- PTABen: Micro-benchmark Suite for Pointer Analysis☆84Feb 26, 2026Updated last week
- Demonstrating the BadAss issue.☆17May 19, 2025Updated 9 months ago
- Hardware-assisted Data-flow Isolation☆29Jan 28, 2018Updated 8 years ago
- ☆29Jul 4, 2018Updated 7 years ago
- Pointer Analysis with Tunable Precision☆28Mar 23, 2016Updated 9 years ago
- ☆56Aug 4, 2022Updated 3 years ago
- ☆13Jun 26, 2019Updated 6 years ago
- Simple Simulator of ARMv6m instructions☆17May 23, 2017Updated 8 years ago
- ☆14Dec 30, 2021Updated 4 years ago
- COIN Attacks: on Insecurity of Enclave Untrusted Interfaces in SGX - ASPLOS 2020☆26Dec 12, 2022Updated 3 years ago
- Preventing code-reuse attacks by stopping code pointer leakages☆37Feb 24, 2016Updated 10 years ago
- ☆18Sep 1, 2018Updated 7 years ago
- ☆16Jun 21, 2024Updated last year
- Code for experiments referenced in the Usenix Security 2017 paper "Strong and Efficient Cache Side-Channel Protection using Hardware Tran…☆14Sep 8, 2022Updated 3 years ago
- ☆16Aug 4, 2023Updated 2 years ago
- Detailed Airplay Protocol Specification☆25Jul 8, 2022Updated 3 years ago
- OSDT2019相关资料☆16Nov 17, 2019Updated 6 years ago
- SafeInit protects software from uninitialized read vulnerabilities - code released for NDSS 2017☆26May 5, 2021Updated 4 years ago
- Integration of Syntia program synthesis tool into the radare2 reverse engineering framework.☆21Dec 4, 2025Updated 3 months ago
- Library to hide DBI artifacts when using Intel Pin. Code from the ASIA CCS 2019 paper "SoK: Using Dynamic Binary Instrumentation for Secu…☆24Nov 12, 2019Updated 6 years ago
- Static Value-Flow Analysis Framework for Source Code☆1,652Feb 26, 2026Updated last week
- Origin-sensitive Control Flow Integrity (OS-CFI) - USENIX Security 2019☆38Jan 10, 2022Updated 4 years ago
- ☆15Apr 13, 2021Updated 4 years ago
- ZipArchive 2.1.4 dir traversal 0-Day☆17Aug 30, 2018Updated 7 years ago
- FunSeeker: Binary Function Identification Tool☆26Dec 23, 2023Updated 2 years ago
- This repo contains a RISC-V ISA extension (proposal) to allow recording of control transfer history to on-chip registers, to support usag…☆23Feb 19, 2025Updated last year
- ☆25Jun 2, 2024Updated last year
- xnu-10.10 mach-o loader that compiles in userland☆19Aug 5, 2015Updated 10 years ago
- MapGuard is a library that enforces a security policy for mmap based page allocations.☆21Dec 14, 2025Updated 2 months ago
- PathArmor context-sensitive CFI implementation☆45Oct 26, 2015Updated 10 years ago
- An external project example using SVF as a library☆24Dec 17, 2025Updated 2 months ago
- rv8 benchmark suite☆23Jul 30, 2020Updated 5 years ago
- A documentation of several Tigress obfuscation passes and an attempt to simplify Mixed Boolean-Arithmetic (MBA) expressions.☆23Dec 3, 2021Updated 4 years ago
- some research results of sep☆20Apr 9, 2021Updated 4 years ago
- Adaptive Callsite-sensitive Control Flow Integrity - EuroS&P'19☆22Dec 12, 2022Updated 3 years ago